cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computing and Informatics Research
ISSN : -     EISSN : 2808375X     DOI : -
Core Subject : Science,
Fokus kajian Journal of Computing and Informatics Research mempublikasikan hasil-hasil penelitian pada bidang informatika, namun tidak terbatas pada bidang ilmu komputer yang lain, seperti: 1. Kriptografi, 2. Artificial Intelligence, 3. Expert System, 4. Decision Support System, 5. Data Mining, dan lainnya.
Articles 88 Documents
Peningkatan Kualitas Citra Karikatur Menggunakan Filter Maksimum dan Filter Median Noviani, Noviani
Journal of Computing and Informatics Research Vol 1 No 1 (2021): November 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i1.110

Abstract

Quality improvement is basically how to overcome various problems that will arise to achieve the expected quality. Quality improvement is an activity to measure performance, benchmarking with standards and any systematic effort to improve performance in order to achieve expected standards. In improving the quality of this caricature image using a maximum filter and a median filter is basically a method to reduce or eliminate noise in a digital image or image, smoothing with a median filter to replace pixels with the highest value of a series formed from a matrix that matches the size of filter window. This filter works by selecting the intensity of the pixel in the middle, after pixel_pixel included in the filter is sorted
Implementasi Data Mining Menggunakan Algoritma J48 Dalam Menentukan Pola Itemset Belanja Pembeli (Study Kasus: Swalayan Brastagi Medan) Sari Pakpahan, Nurmita
Journal of Computing and Informatics Research Vol 1 No 1 (2021): November 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i1.111

Abstract

Brastagi supermarket is a shop that sells all kinds of daily needs. In determining the number of goods, Brastagi supermarkets in Medan are still experiencing very heavy obstacles because so far they are still using very simple applications in managing sales data. Based on this, the researcher is interested in a search for patterns of buyers' shopping itemset from large-scale data and that associates data with one another using the Decision tree j48 algorithm. So that it can assist in making decisions on determining the amount of goods to be provided, because the quality of the company is judged by the seriousness in managing sales data. The purpose of this study is to determine the pattern of the buyer's shopping itemset, which items are often purchased and later the company can make decisions to increase sales of these goods.
Perancangan Aplikasi Istilah Olahraga Berbasis Mobile dengan Penerapan Algoritma Apostolico-Giancarlo Yus Mori Silitonga, Frans
Journal of Computing and Informatics Research Vol 1 No 1 (2021): November 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i1.112

Abstract

In this era of globalization, it is very necessary to have an information system that is fast and ready to use due to increasingly sophisticated human civilization and humans themselves are required to be able to adapt to these developments. Especially in the development of sports in information technology. The application design process carried out is still difficult to find the meaning of certain sports terms in sports. In order to overcome this problem, the author applies the apostolico-giancarlo algorithm to the application of mobile-based sports terms that can facilitate the information search process, compared to those who still have to search for books which require a relatively long time in searching for the meaning of sport. With the program design that has been made by the author for the general public, especially sportsmen, it is hoped that it can help in the process of finding information. The program in the form of Eclipse Juno consists of several searching, biodata, and closing
Penerapan Metode Transportasi Untuk Analisa Pengiriman Barang Pada PT Cargo Indonesia Medan Togatorop, R.G. Frenton
Journal of Computing and Informatics Research Vol 1 No 1 (2021): November 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i1.113

Abstract

Delivery of goods at this time has become an urgent need, because if there is no delivery of goods between regions, there will be inequality of needs in an area. Of course, the delivery of goods is also very important for a country, because the delivery of goods is one way to sell domestic products abroad, and of course this makes a country prosperous. The transportation problem is one of the methods of solving linear programming problems whose solution can be done by using the simplex method or by using special techniques called transportation technic whose solutions are more efficient. Least Cost method is a method that makes allocations based on the lowest cost. By using this method, it is easier for PT. Indah Cargo is in the process of delivering goods
Implementasi Algoritma Adaptive Huffman Code Dalam Kompresi File Teks Terenkripsi Algoritma Loki97 Rahmad Syahputra
Journal of Computing and Informatics Research Vol 1 No 1 (2021): November 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i1.114

Abstract

Data security and confidentiality is one of the most important aspects in today's information systems. Due to the rapid development of science and technology that allows the emergence of new techniques, which are misused by certain parties that threaten the security of the information system. The fall of information into the hands of other parties can cause harm to the owner of the information. Therefore we need a way that can provide security for the data, one of which is using cryptographic techniques. Cryptography technique is a science or art in fulfilling security aspects in communicating by changing the content of information into incomprehensible information. One of the algorithms that can be used is the Loki97 algorithm, which is a cryptographic algorithm that uses the Feistel network system. The process carried out in this study is to first encrypt the text file using the Loki97 algorithm, then the results of the encrypted file will be compressed using the Adaptive Huffman Code algorithm, resulting in an encrypted and compressed file.
Kompresi Video Digital Menggunakan Metode Embedded Zerotree Wavelet (EZW) Parapat, Rosdelima
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i3.320

Abstract

In the era of technology in the field of multimedia, especially in processing moving images or often called digital video, it is very fast and competes in image and sound quality. Video files in MP4 format are very widely used today on social media which results in little storage space remaining in memory. Data compression is a process that can convert an input data stream (original data) into another data stream (compressed data) which has a smaller size. The compression process is the process of reducing the size of a data to produce a digital representation that is dense or compact but can still represent the quantity of information contained. Digital video is a computer file that is used to store a collection of digital files such as video, audio, metadata, information, chapter divisions, and titles at once, which can be played or used through certain software on a computer. There are many data compression methods currently available, but in this study the working principle of the EZW method will be discussed. The Embedded Zerotree Wavelet (EZW) method is an image compression algorithm that is simple, very effective, has properties where the bits in the bit stream are sorted according to their importance and produces a fully embedded code
Penerapan Metode Data Mining C4.5 dalam Penentuan Kelayakan Rehabilitas Rumah Warga Aulia Sugarda; Saifullah; Jalaluddin; Agus Perdana Windarto; Wendi Robiansyah
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i3.321

Abstract

The purpose of the study was to find out which houses deserve to be rehabilitated in Pematang Dolok Kahean Village. The source of the data used in this research is using datasets that already exist in Pematang Dolok Kahean Village. The solution given is to classify the feasibility level of residents' houses using the C4.5 data mining method and using the Rapidminer software assistance. This method was chosen because it is one of the most widely used decision tree methods to predict a case. The results of the study stated that the system's accuracy value was 83.33% using split validation where this method produced several rules that could be used in determining the feasibility of the rehabilitation of residents' houses so that government subsidies could be channeled appropriately.
Modifikasi Algoritma Vigenere Cipher dengan Pembangkit Kunci Random Number Generator Dalam Pengamanan Citra Digital Amalia Zebua, Shafira
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i3.345

Abstract

Digital image is an image that can be processed by a computer. Digital images that are not allowed to be known by others or are said to be private and are not allowed to be manipulated by other irresponsible parties. The act of manipulating, hijacking or tapping the image will cause harm to the owner of the image. The technique to reduce these actions is to use cryptographic techniques. Cryptographic techniques are very well known for securing information with a password that only the owner of the image understands. To strengthen the results of the encryption carried out by the Vigenere Cipher Algorithm, modifications are made to the Random Number Generator. The Random Number Generator used is Linear Congruent Generator which has linear recursive properties combined with modulus. So the combination of vigenere cipher with random number generator Linear Congruent Generator is very difficult for other parties to abuse the image
Kompresi File Teks dengan Menggunakan Kombinasi Squitur dan Elias Gamma Code Fransius Silaban, Tulus
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i3.346

Abstract

Text files have a large size that affects the storage space and the sending process. This size is a factor in how much storage space will be used and how long it will take to send files. The longer the text, the larger the size. Large sizes can be overcome by doing the compression process. Compression is done to reduce the size of a file. Compression algorithms that can be used are sequitur algorithm and elias gamma code algorithm. The advantage of the sequitur algorithm is to replace 2 characters side by side with 1 terminal character in the character set, while the advantage of the elias gamma code algorithm is to replace the initial bit of the character with a gamma elias code bit. The two algorithms will be combined to produce a smaller size than the previous one
Perancangan Aplikasi Duplicate Image Scanner Menerapkan Algoritma MD5 Sanchia Melati BR Lumbantoruan, Gaberia
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/comforch.v1i3.347

Abstract

Currently we are in the era of the digital world, there are lots of equipment that have tools to record photos in the form of cameras found on smartphones. The weakness of smartphones is the small storage space, so users must be good at managing files stored on the smartphone. There are so many applications in smartphones that provide facilities for sharing images. This of course will greatly burden the storage space of the smartphone because it stores image files which are generally large in size, especially if the image files are the same or duplicate, of course it is very burdensome for storage space. It will be very difficult to distinguish an image file without looking at the contents of the image file. So if you want to distinguish one image file from another, the user must see the contents of the image file and this will certainly be very difficult. For that we need a method that can be used to identify the same image file or duplicate image files so that a decision can be made to delete the duplicate document files so as to save storage space. In cryptography there is a hash function which is a one-way function that can generate the identity of a file, where if the image file contains the same content, it will produce the same hash value. It can be used to identify the same or duplicate image files. In the hash function there is the MD5 method or Message Digest 5 which is one of the hashing algorithms that is often used to encrypt data with a length of 128 bits. By applying this algorithm to the file scanner application, the results of the image file search are grouped based on the same hash value and users can make it easier and faster for users to delete duplicate image files without having to open and view the contents of the file